Skip to Main Content
All Trimarc services are now delivered through TrustedSec! Learn more

The Security Blog

Get up-to-date security insights, tips, and tricks from our amazing team sent to your inbox.

Browse our blogs

We cover it all in The Security Blog. Discover what you’ve been looking for.

Topics
Author
Blog January 23 2025

Operating Inside the Interpreted: Offensive Python

Discover how to use Python for malicious purposes on Windows, leveraging its ease of installation and existing tradecraft to evade detection and deploy malware…

Read about this article
Blog January 14 2025

Command Line Underdog: WMIC in Action

My typical engagements are mostly Red Teams, so I do not often get a chance to play with terminal server application breakouts—but on a recent engagement, I…

Read about this article
Blog January 07 2025

Solving NIST Password Complexities: Guidance From a GRC Perspective

Understand NIST's Digital Identity Guidelines for secure password implementation and access control, ensuring risk-based authentication and minimizing breaches…

Read about this article
Blog December 19 2024

Malware Series: Process Injection Mapped Sections

This post explains a common malware technique using shared memory sections to inject and execute code in a remote process, demonstrating the process in C and…

Read about this article
Blog December 17 2024

Top 10 Blogs of 2024

At TrustedSec, we are all about leveraging our collective intelligence and knowledge to uplift the cybersecurity community. One of our most popular educational…

Read about this article
Blog December 05 2024

On-Demand BOF

Learn from the experts at TrustedSec on-demand, build BOFs with confidence, and gain hands-on experience with two previously unreleased tools, including a…

Read about this article
Blog December 03 2024

Discovering a Deserialization Vulnerability in LINQPad

Discovering a Deserialization Vulnerability in LINQPad, written by James Williams, reveals a novel deserialization vulnerability in a.NET application with over…

Read about this article
Blog November 21 2024

A 5-Minute Guide to HTTP Response Codes

If you've done any network scanning or application testing, you've run into your fair share of HTTP response codes. If not, these codes will show up in most…

Read about this article
Blog November 14 2024

Attacking JWT with Self-Signed Claims

Understanding JWS vulnerabilities and how to exploit them is crucial for securing applications and APIs that use JSON Web Tokens (JWTs).

Read about this article
Blog November 13 2024

EKUwu: Not just another AD CS ESC

Using default version 1 certificate templates, an attacker can exploit a vulnerability (EKUwu) to generate certificates that bypass security controls,…

Read about this article
Blog November 07 2024

Detecting CVE-2020-0688 Remote Code Execution Vulnerability on Microsoft Exchange Server

Exploiting Indicators of Compromise: Understanding SYSMON, IIS Logs, and Process Execution for Enhanced Security.

Read about this article
Blog October 29 2024

Android Hacking for Beginners

Bypass Android security measures to access sensitive data and transfer funds with this step-by-step guide to exploiting vulnerabilities in the Damn Vulnerable…

Read about this article